rek7 / madlib
PAM Backdoor
☆27Updated last year
Alternatives and similar repositories for madlib:
Users that are interested in madlib are comparing it to the libraries listed below
- ☆17Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 8 months ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- various slides and presentations I've worked on☆18Updated 10 months ago
- ☆19Updated 4 years ago
- ☆12Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year